SlideShare une entreprise Scribd logo
1  sur  26
American Privacy:
     A History of the Right to Privacy
           in the United States

                         Frederick S. Lane
                        FSLane3@gmail.com

University of Science and Technology of China
                  Hefei, China
                            14 June 2012
www.FrederickLane.com                      www.CybertrapsfortheYoung.com
Background
                        • Attorney, Educational
                          Consultant & Lecturer
                        • Author of 7 Books
                        • Computer Forensics
                          Expert
                        • 10 Years -- Burlington
                          (VT) School Board
                        • Technology & Privacy
                          Specialist
                        • Student Safety Advocate
www.FrederickLane.com         www.CybertrapsfortheYoung.com
Previous Books




www.FrederickLane.com   www.CybertrapsfortheYoung.com
Outline
• Colonial Privacy Issues
• The Bill of Rights
• Privacy in the 1890s
• Privacy and Computers
• The Warren Court
• The Future of Privacy
www.FrederickLane.com         www.CybertrapsfortheYoung.com
America’s First Privacy Advocates




 www.FrederickLane.com   www.CybertrapsfortheYoung.com
Founders of American Privacy




 www.FrederickLane.com   www.CybertrapsfortheYoung.com
“So That a Man Can Stand Up”




 www.FrederickLane.com   www.CybertrapsfortheYoung.com
The              4 th   Amendment
The right of the people to be secure in
their persons, houses, papers, and effects,
against unreasonable searches and
seizures, shall not be violated, and no
Warrants shall issue, but upon
probable cause, supported by Oath or
affirmation, and particularly
describing the place to be searched, and
the persons or things to be seized.
www.FrederickLane.com       www.CybertrapsfortheYoung.com
Privacy in the Bill of Rights
 1st Amendment – Freedoms of speech, religion,
     association, assembly
 2nd Amendment – Right to Bear Arms
 3rd Amendment – No quartering of troops
 4th Amendment – Freedom from unreasonable
     search and seizure
 5th Amendment – Freedom from self-incrimination
 6th Amendment – Right to counsel at trial
 8th Amendment – Freedom from cruel and unusual
     punishment
 9th Amendment – Unenumerated rights reserved
 www.FrederickLane.com          www.CybertrapsfortheYoung.com
1890s – Good or Bad for Privacy?




 www.FrederickLane.com   www.CybertrapsfortheYoung.com
1890s – Good or Bad for Privacy?




 www.FrederickLane.com   www.CybertrapsfortheYoung.com
1890s – Good or Bad for Privacy?




 www.FrederickLane.com   www.CybertrapsfortheYoung.com
40 Years Later




www.FrederickLane.com    www.CybertrapsfortheYoung.com
60 Years Later




www.FrederickLane.com    www.CybertrapsfortheYoung.com
A Federal Right to Privacy
• Mapp v. Ohio, 367 U.S. 643 (1961) –
  exclusionary rule
• Griswold v. Connecticut, 381 U.S. 479
  (1965) – establishing a “right to privacy”
• Miranda v. Arizona, 384 U.S. 436 (1966) –
  right to remain silent
• Katz v. United States, 389 U.S. 347 (1967)
  – warrantless wiretapping is illegal

www.FrederickLane.com       www.CybertrapsfortheYoung.com
The Government and Privacy




 www.FrederickLane.com   www.CybertrapsfortheYoung.com
Corporations and Privacy
   Search Engines       Social Networking Sites




www.FrederickLane.com       www.CybertrapsfortheYoung.com
Changing Concept of Phone Privacy




 www.FrederickLane.com   www.CybertrapsfortheYoung.com
How Private Is Social Media?




www.FrederickLane.com   www.CybertrapsfortheYoung.com
Cultural Differences




www.FrederickLane.com   www.CybertrapsfortheYoung.com
Nothing to Hide, Nothing to Fear?




www.FrederickLane.com   www.CybertrapsfortheYoung.com
GeoLocation & Granularity




  POS                   GPS   RFID   Biometrics          Nanobots



www.FrederickLane.com                www.CybertrapsfortheYoung.com
New Frontiers of Surveillance




 www.FrederickLane.com   www.CybertrapsfortheYoung.com
Privacy R.I.P.?
•   What Is It We’re Trying to Protect?
•   No Single Definition of Privacy
•   Fundamental Concept is Control
•   Switch to “Opt-In” Model
•   Federal Privacy Protection Agency?
•   Education and Self-Control
•   A Transparent Society?

    www.FrederickLane.com         www.CybertrapsfortheYoung.com
Uncharted Waters




www.FrederickLane.com   www.CybertrapsfortheYoung.com
American Privacy:
     A History of the Right to Privacy
           in the United States

                         Frederick S. Lane
                        FSLane3@gmail.com

University of Science and Technology of China
                  Hefei, China
                            14 June 2012
www.FrederickLane.com                      www.CybertrapsfortheYoung.com

Contenu connexe

Tendances

Breach of Privacy in the Age of Technology
Breach of Privacy in the Age of Technology Breach of Privacy in the Age of Technology
Breach of Privacy in the Age of Technology
BriannaPrice5
 
Comm law ppt invasion of privacy
Comm law ppt invasion of privacyComm law ppt invasion of privacy
Comm law ppt invasion of privacy
Julie Price
 
Tracking trollers
Tracking trollersTracking trollers
Tracking trollers
Liz Henry
 

Tendances (20)

2013-04-02 Cybertraps for Educators
2013-04-02 Cybertraps for Educators2013-04-02 Cybertraps for Educators
2013-04-02 Cybertraps for Educators
 
Breach of Privacy in the Age of Technology
Breach of Privacy in the Age of Technology Breach of Privacy in the Age of Technology
Breach of Privacy in the Age of Technology
 
Cybertraps for Educators
Cybertraps for EducatorsCybertraps for Educators
Cybertraps for Educators
 
Verifying sources and content found on social media
Verifying sources and content found on social media Verifying sources and content found on social media
Verifying sources and content found on social media
 
2011 02-17 cybertraps for law students and young lawyers
2011 02-17 cybertraps for law students and young lawyers2011 02-17 cybertraps for law students and young lawyers
2011 02-17 cybertraps for law students and young lawyers
 
Blogger Beware: Legal Issues Every Blogger Should Know
Blogger Beware: Legal Issues Every Blogger Should KnowBlogger Beware: Legal Issues Every Blogger Should Know
Blogger Beware: Legal Issues Every Blogger Should Know
 
2015-02-13 Cybertraps for Educators
2015-02-13 Cybertraps for Educators2015-02-13 Cybertraps for Educators
2015-02-13 Cybertraps for Educators
 
Fourth Amendment as a Service - Workshop - 2-21-17
Fourth Amendment as a Service - Workshop - 2-21-17Fourth Amendment as a Service - Workshop - 2-21-17
Fourth Amendment as a Service - Workshop - 2-21-17
 
Comm law ppt invasion of privacy
Comm law ppt invasion of privacyComm law ppt invasion of privacy
Comm law ppt invasion of privacy
 
Policy Briefing Presentation
Policy Briefing PresentationPolicy Briefing Presentation
Policy Briefing Presentation
 
Presentación3
Presentación3Presentación3
Presentación3
 
Bloggers and the law: What to know before you publish.
Bloggers and the law: What to know before you publish.Bloggers and the law: What to know before you publish.
Bloggers and the law: What to know before you publish.
 
The Art of Legal Research
The Art of Legal ResearchThe Art of Legal Research
The Art of Legal Research
 
Social Media Forensics
Social Media ForensicsSocial Media Forensics
Social Media Forensics
 
The Fifth Estate and Its Future
The Fifth Estate and Its FutureThe Fifth Estate and Its Future
The Fifth Estate and Its Future
 
Obscenity
ObscenityObscenity
Obscenity
 
Censoring the web: mapping content filtering in UK public libraries - Daniel ...
Censoring the web: mapping content filtering in UK public libraries - Daniel ...Censoring the web: mapping content filtering in UK public libraries - Daniel ...
Censoring the web: mapping content filtering in UK public libraries - Daniel ...
 
Tracking trollers
Tracking trollersTracking trollers
Tracking trollers
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
 
Chinafinal Letter To Clinton Internet Frdom 2 3 10
Chinafinal Letter To Clinton Internet Frdom 2 3 10Chinafinal Letter To Clinton Internet Frdom 2 3 10
Chinafinal Letter To Clinton Internet Frdom 2 3 10
 

Similaire à American Privacy: A History of the Right to Privacy in the United States

The Court and the Cross: Understanding the Separation of Church and State in ...
The Court and the Cross: Understanding the Separation of Church and State in ...The Court and the Cross: Understanding the Separation of Church and State in ...
The Court and the Cross: Understanding the Separation of Church and State in ...
Frederick Lane
 

Similaire à American Privacy: A History of the Right to Privacy in the United States (20)

2010-07-20 American Privacy
2010-07-20 American Privacy2010-07-20 American Privacy
2010-07-20 American Privacy
 
The Court and the Cross: Understanding the Separation of Church and State in ...
The Court and the Cross: Understanding the Separation of Church and State in ...The Court and the Cross: Understanding the Separation of Church and State in ...
The Court and the Cross: Understanding the Separation of Church and State in ...
 
2010-11-02 Cybertraps for the Elderly
2010-11-02 Cybertraps for the Elderly2010-11-02 Cybertraps for the Elderly
2010-11-02 Cybertraps for the Elderly
 
2010-10-29 Can You See Me Now?
2010-10-29 Can You See Me Now?2010-10-29 Can You See Me Now?
2010-10-29 Can You See Me Now?
 
2011-02-24 Living in a Wired World
2011-02-24 Living in a Wired World2011-02-24 Living in a Wired World
2011-02-24 Living in a Wired World
 
2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
 
2015-02-12 Cybertraps for the Young
2015-02-12 Cybertraps for the Young2015-02-12 Cybertraps for the Young
2015-02-12 Cybertraps for the Young
 
2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
 
2010-07-28 Can You See Me Now?
2010-07-28 Can You See Me Now?2010-07-28 Can You See Me Now?
2010-07-28 Can You See Me Now?
 
2013-04-06 Find It Fast and Free on the Net
2013-04-06 Find It Fast and Free on the Net2013-04-06 Find It Fast and Free on the Net
2013-04-06 Find It Fast and Free on the Net
 
2010-09-09 The World-Wide Bathroom Wall
2010-09-09 The World-Wide Bathroom Wall2010-09-09 The World-Wide Bathroom Wall
2010-09-09 The World-Wide Bathroom Wall
 
2011-06-23 Privacy, Anonymity, and Intellectual Freedom in the Facebook Era
2011-06-23 Privacy, Anonymity, and Intellectual Freedom in the Facebook Era2011-06-23 Privacy, Anonymity, and Intellectual Freedom in the Facebook Era
2011-06-23 Privacy, Anonymity, and Intellectual Freedom in the Facebook Era
 
2015-02-23 Cybertraps for the Young
2015-02-23 Cybertraps for the Young2015-02-23 Cybertraps for the Young
2015-02-23 Cybertraps for the Young
 
Divorce in the Digital Era
Divorce in the Digital EraDivorce in the Digital Era
Divorce in the Digital Era
 
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
 
Texting, Tweeting, Teens, and Teachers
Texting, Tweeting, Teens, and TeachersTexting, Tweeting, Teens, and Teachers
Texting, Tweeting, Teens, and Teachers
 
American Privacy: The 400-Year History of Our Most Contested Right
American Privacy: The 400-Year History of Our Most Contested RightAmerican Privacy: The 400-Year History of Our Most Contested Right
American Privacy: The 400-Year History of Our Most Contested Right
 
Digital dangers pp1
Digital dangers pp1Digital dangers pp1
Digital dangers pp1
 
Researching Social Media
Researching Social MediaResearching Social Media
Researching Social Media
 
2014-11-06 Texting, Tweeting, Teens, and Teachers
2014-11-06 Texting, Tweeting, Teens, and Teachers2014-11-06 Texting, Tweeting, Teens, and Teachers
2014-11-06 Texting, Tweeting, Teens, and Teachers
 

Plus de Frederick Lane

Plus de Frederick Lane (20)

2020-03-03 Privacy and the Ethical Educator
2020-03-03 Privacy and the Ethical Educator2020-03-03 Privacy and the Ethical Educator
2020-03-03 Privacy and the Ethical Educator
 
2020-02-25 Cybertraps and Cyberethics for Educators
2020-02-25 Cybertraps and Cyberethics for Educators2020-02-25 Cybertraps and Cyberethics for Educators
2020-02-25 Cybertraps and Cyberethics for Educators
 
2020-02-24 Cultivating a Culture of Cybersecurity
2020-02-24 Cultivating a Culture of Cybersecurity2020-02-24 Cultivating a Culture of Cybersecurity
2020-02-24 Cultivating a Culture of Cybersecurity
 
2020-02-23 Cybersecurity Audits for Tech Directors
2020-02-23 Cybersecurity Audits for Tech Directors2020-02-23 Cybersecurity Audits for Tech Directors
2020-02-23 Cybersecurity Audits for Tech Directors
 
2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital Mob2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital Mob
 
2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational Tool2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational Tool
 
2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social Media2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social Media
 
2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for Educators2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for Educators
 
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers
 
2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEE2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEE
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers
 
2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?
 
2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR Professionals2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR Professionals
 
2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEE2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEE
 
2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective Teachers2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective Teachers
 
2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEE2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEE
 
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
 
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
 
2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get Caught2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get Caught
 

Dernier

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
fonyou31
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Dernier (20)

Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

American Privacy: A History of the Right to Privacy in the United States

  • 1. American Privacy: A History of the Right to Privacy in the United States Frederick S. Lane FSLane3@gmail.com University of Science and Technology of China Hefei, China 14 June 2012 www.FrederickLane.com www.CybertrapsfortheYoung.com
  • 2. Background • Attorney, Educational Consultant & Lecturer • Author of 7 Books • Computer Forensics Expert • 10 Years -- Burlington (VT) School Board • Technology & Privacy Specialist • Student Safety Advocate www.FrederickLane.com www.CybertrapsfortheYoung.com
  • 3. Previous Books www.FrederickLane.com www.CybertrapsfortheYoung.com
  • 4. Outline • Colonial Privacy Issues • The Bill of Rights • Privacy in the 1890s • Privacy and Computers • The Warren Court • The Future of Privacy www.FrederickLane.com www.CybertrapsfortheYoung.com
  • 5. America’s First Privacy Advocates www.FrederickLane.com www.CybertrapsfortheYoung.com
  • 6. Founders of American Privacy www.FrederickLane.com www.CybertrapsfortheYoung.com
  • 7. “So That a Man Can Stand Up” www.FrederickLane.com www.CybertrapsfortheYoung.com
  • 8. The 4 th Amendment The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. www.FrederickLane.com www.CybertrapsfortheYoung.com
  • 9. Privacy in the Bill of Rights 1st Amendment – Freedoms of speech, religion, association, assembly 2nd Amendment – Right to Bear Arms 3rd Amendment – No quartering of troops 4th Amendment – Freedom from unreasonable search and seizure 5th Amendment – Freedom from self-incrimination 6th Amendment – Right to counsel at trial 8th Amendment – Freedom from cruel and unusual punishment 9th Amendment – Unenumerated rights reserved www.FrederickLane.com www.CybertrapsfortheYoung.com
  • 10. 1890s – Good or Bad for Privacy? www.FrederickLane.com www.CybertrapsfortheYoung.com
  • 11. 1890s – Good or Bad for Privacy? www.FrederickLane.com www.CybertrapsfortheYoung.com
  • 12. 1890s – Good or Bad for Privacy? www.FrederickLane.com www.CybertrapsfortheYoung.com
  • 13. 40 Years Later www.FrederickLane.com www.CybertrapsfortheYoung.com
  • 14. 60 Years Later www.FrederickLane.com www.CybertrapsfortheYoung.com
  • 15. A Federal Right to Privacy • Mapp v. Ohio, 367 U.S. 643 (1961) – exclusionary rule • Griswold v. Connecticut, 381 U.S. 479 (1965) – establishing a “right to privacy” • Miranda v. Arizona, 384 U.S. 436 (1966) – right to remain silent • Katz v. United States, 389 U.S. 347 (1967) – warrantless wiretapping is illegal www.FrederickLane.com www.CybertrapsfortheYoung.com
  • 16. The Government and Privacy www.FrederickLane.com www.CybertrapsfortheYoung.com
  • 17. Corporations and Privacy Search Engines Social Networking Sites www.FrederickLane.com www.CybertrapsfortheYoung.com
  • 18. Changing Concept of Phone Privacy www.FrederickLane.com www.CybertrapsfortheYoung.com
  • 19. How Private Is Social Media? www.FrederickLane.com www.CybertrapsfortheYoung.com
  • 20. Cultural Differences www.FrederickLane.com www.CybertrapsfortheYoung.com
  • 21. Nothing to Hide, Nothing to Fear? www.FrederickLane.com www.CybertrapsfortheYoung.com
  • 22. GeoLocation & Granularity POS GPS RFID Biometrics Nanobots www.FrederickLane.com www.CybertrapsfortheYoung.com
  • 23. New Frontiers of Surveillance www.FrederickLane.com www.CybertrapsfortheYoung.com
  • 24. Privacy R.I.P.? • What Is It We’re Trying to Protect? • No Single Definition of Privacy • Fundamental Concept is Control • Switch to “Opt-In” Model • Federal Privacy Protection Agency? • Education and Self-Control • A Transparent Society? www.FrederickLane.com www.CybertrapsfortheYoung.com
  • 25. Uncharted Waters www.FrederickLane.com www.CybertrapsfortheYoung.com
  • 26. American Privacy: A History of the Right to Privacy in the United States Frederick S. Lane FSLane3@gmail.com University of Science and Technology of China Hefei, China 14 June 2012 www.FrederickLane.com www.CybertrapsfortheYoung.com